- Issued:
- 2022-12-15
- Updated:
- 2022-12-15
RHSA-2022:9073 - Moderate: nodejs:16 security, bug fix, and enhancement update
Synopsis
Moderate: nodejs:16 security, bug fix, and enhancement update
Type/Severity
Security Advisory Moderate
Topic
An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages were updated to later upstream versions: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
-
nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
-
nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
-
nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
-
minimist: prototype pollution (CVE-2021-44906)
-
nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
-
nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
-
nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- nodejs:16/nodejs: Packaged version of undici does not fit with declared version. [rhel-8] (BZ#2151625)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension | 8.8 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 8.10 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 8 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 8.8 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 8.10 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 8 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 8.8 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 8.10 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 8 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 8.8 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 8.10 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 8.8 | ppc64le |
| Red Hat Enterprise Linux Server - TUS | 8.8 | x86_64 |
Updated Packages
- nodejs-debuginfo-16.18.1-3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- nodejs-devel-16.18.1-3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- nodejs-nodemon-2.0.20-2.module+el8.7.0+17412+bb0e4a6b.src.rpm
- nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06.noarch.rpm
- nodejs-debugsource-16.18.1-3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06.src.rpm
- nodejs-nodemon-2.0.20-2.module+el8.7.0+17412+bb0e4a6b.noarch.rpm
- nodejs-docs-16.18.1-3.module+el8.7.0+17465+1a1abd74.noarch.rpm
- nodejs-full-i18n-16.18.1-3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- npm-8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74.x86_64.rpm
- nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74.src.rpm
- nodejs-devel-16.18.1-3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- nodejs-full-i18n-16.18.1-3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- nodejs-debuginfo-16.18.1-3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- nodejs-debugsource-16.18.1-3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- npm-8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74.aarch64.rpm
- nodejs-full-i18n-16.18.1-3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- nodejs-debuginfo-16.18.1-3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- nodejs-debugsource-16.18.1-3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- nodejs-devel-16.18.1-3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- npm-8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74.ppc64le.rpm
- nodejs-devel-16.18.1-3.module+el8.7.0+17465+1a1abd74.s390x.rpm
- nodejs-full-i18n-16.18.1-3.module+el8.7.0+17465+1a1abd74.s390x.rpm
- nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74.s390x.rpm
- nodejs-debuginfo-16.18.1-3.module+el8.7.0+17465+1a1abd74.s390x.rpm
- npm-8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74.s390x.rpm
- nodejs-debugsource-16.18.1-3.module+el8.7.0+17465+1a1abd74.s390x.rpm
Fixes
- This content is not included.BZ - 2040839
- This content is not included.BZ - 2040846
- This content is not included.BZ - 2040856
- This content is not included.BZ - 2040862
- This content is not included.BZ - 2066009
- This content is not included.BZ - 2134609
- This content is not included.BZ - 2140911
- This content is not included.BZ - 2142806
CVEs
- CVE-2021-44531
- CVE-2021-44532
- CVE-2021-44533
- CVE-2021-44906
- CVE-2022-3517
- CVE-2022-21824
- CVE-2022-43548
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.